Installation not allowed on devices with SecureBoot enabled.
Installation not allowed on devices with SecureBoot enabled.
You're trying to set up a dual-boot between Manjaro/Debian and Windows 11 on your Dell 5502, but you're having trouble installing or booting either OS. Here are some steps you can try:
- Check if BitLocker is properly configured and ensure it's not interfering with the installation.
- Use a USB installer for Windows 11 to create a bootable drive; sometimes this bypasses issues.
- For dual-booting, consider using a tool like Rufus or Etcher to prepare ISO images.
- If you're on a customer AMD Ryzen5 machine with BitLocker, verify that the license is valid and not corrupted.
- Try booting from a live USB of Manjaro/Debian first to confirm compatibility.
- Consult Dell support or your hardware specs for specific dual-boot guidance.
Look for distributions offering secure boot like Fedora, Mint, Ubuntu, or Zorin.
Turn off secure boot to install a fresh operating system. Once disabled, any Linux distribution can handle secure boot, though some setups do it automatically. You can reactivate it using the guidelines in this page: https://wiki.archlinux.org/title/Unified...ecure_Boot
In fact, you don’t need to turn off secure boot to set up a new OS. A setup mode lets you boot unsigned bootloaders once. Configuring secure boot can be confusing on most Linux distributions because you’ll often be prompted for passwords during installation and installing the MOKutils key is tricky at first. I usually skip setting secure boot unless it’s required.
It really comes down to the environment. On a personal Linux setup it works just fine, but in a professional setting it presents different challenges. From a security standpoint, Secure Boot still offers advantages even on Linux, as vulnerabilities and malware can compromise the boot process and install malicious kernels.
wubi-uefi offers one method, utilizing the Windows BCD menu which is confirmed by MS keys. It might be easier to employ shims and similar tools, yet I discovered a more efficient approach: generate your own signing key, sign the kernels with it, and store the key in your UEFI BIOS keystore. First, ensure you have backups of existing keys. Then, create a personal signing key and signing key using OpenSSL, save them to their respective files, and add the key to your BIOS keystore. Remember to backup the original keys before proceeding.